Storage media access control method and system
First Claim
Patent Images
1. A method for modifying an optical path of an optical medium, the optical medium including a first layer adjacent a data layer comprising:
- selecting a region of the first layer to be distorted; and
distorting the region of the first layer such that a reading operation of data stored in the first layer corresponding to the distorted region is modified.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for controlling access to a storage medium, such as an optically readable medium. Light sensitive or other materials that are adapted to change state and affect reading of a storage medium are used to control access to data that may be stored on optical medium and/or to control use of the medium.
-
Citations
20 Claims
-
1. A method for modifying an optical path of an optical medium, the optical medium including a first layer adjacent a data layer comprising:
- selecting a region of the first layer to be distorted; and
distorting the region of the first layer such that a reading operation of data stored in the first layer corresponding to the distorted region is modified. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- selecting a region of the first layer to be distorted; and
-
8. A method for preventing unauthorized use of digital content data stored on a medium comprising:
- determining one or more data segments in the digital content data, modifying one or more of such data segments to generate modified data comprising second data;
storing the modified data at predetermined memory locations on the medium. - View Dependent Claims (9, 10, 11, 12, 13)
- determining one or more data segments in the digital content data, modifying one or more of such data segments to generate modified data comprising second data;
-
14. A method for preventing unauthorized use of digital content data to be transferred from a first system to a second system comprising:
- locating an archive of a digital content data at the first system;
determining transaction data of the second system;
determining whether the transaction data of the second system indicates whether the second system is a valid recipient of the archive; and
transferring the archive from the first system to the second system if the second system is a valid recipient. - View Dependent Claims (15, 16, 17, 18)
- locating an archive of a digital content data at the first system;
-
19. A method for authenticating a digital medium comprising:
- monitoring a transfer rate of read-data resulting from the reading of valid data stored on a digital medium at a physical location;
determining, from the monitored transfer rate, the presence of an anomaly region on the digital medium corresponding to the physical location of the valid data on the digital medium; and
authenticating the digital medium based on a characteristic of the anomaly region.
- monitoring a transfer rate of read-data resulting from the reading of valid data stored on a digital medium at a physical location;
-
20. A system for authenticating a digital medium comprising:
- a monitor for monitoring a transfer rate of read data resulting from the reading of valid data stored on a digital medium at a physical location;
an anomaly detector for determining, from the monitored transfer rate, the presence of an anomaly region on the digital medium corresponding to the physical location of the valid data on the digital medium; and
an authenticator for authenticating the digital medium based on a characteristic of the anomaly region.
- a monitor for monitoring a transfer rate of read data resulting from the reading of valid data stored on a digital medium at a physical location;
Specification